CN115718924A - Data processing method, device, equipment and storage medium - Google Patents

Data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115718924A
CN115718924A CN202110975368.XA CN202110975368A CN115718924A CN 115718924 A CN115718924 A CN 115718924A CN 202110975368 A CN202110975368 A CN 202110975368A CN 115718924 A CN115718924 A CN 115718924A
Authority
CN
China
Prior art keywords
mobile terminal
server
data
distance
intelligent wearable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110975368.XA
Other languages
Chinese (zh)
Inventor
祖金伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202110975368.XA priority Critical patent/CN115718924A/en
Priority to PCT/CN2022/111028 priority patent/WO2023024888A1/en
Publication of CN115718924A publication Critical patent/CN115718924A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

The embodiment of the application discloses a data processing method, a data processing device, data processing equipment and a storage medium. The method is executed by a mobile terminal and comprises the following steps: determining the distance between the intelligent wearable device and the bound intelligent wearable device; when the distance exceeds a first set threshold value, locking the mobile terminal; and when the unlocking failure times of the mobile terminal exceed a second set threshold or a data protection instruction sent by the server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal. The data processing method provided by the embodiment of the application can realize the protection of the data in the mobile terminal and can improve the safety of the data.

Description

Data processing method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of data security, in particular to a data processing method, a data processing device, data processing equipment and a storage medium.
Background
Intelligent wearing equipment is the general term that uses wearing formula technique to carry out intelligent design, develop the equipment that can dress to daily wearing, if: watches, bracelets, glasses, clothing, and the like. The intelligent wearable device is usually matched with a mobile terminal for use.
Data security refers to protecting a user's hardware, software, and data from being damaged, altered, and revealed by casual and malicious causes. The realization of the protection of the data security of the mobile terminal through the intelligent wearable device is very important. At present, the main mode of intelligence wearing equipment and mobile terminal equipment communication is bluetooth transmission, receives the limitation of bluetooth connection technology itself, and the communication distance of equipment receives the restriction for the reliability to the data security's in the mobile terminal protection is not high.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, data processing equipment and a storage medium, which can protect data in a mobile terminal and improve the security of the data.
In order to achieve the above object, an embodiment of the present application discloses a data processing method, where the method is executed by a mobile terminal, and includes:
determining the distance between the intelligent wearable device and the bound intelligent wearable device;
when the distance exceeds a first set threshold value, locking the mobile terminal;
when the unlocking failure times of the mobile terminal exceed a second set threshold or a data protection instruction sent by a server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal.
In order to achieve the above object, an embodiment of the present application discloses a data processing method, where the method is executed by an intelligent wearable device, and includes:
determining the distance between the mobile terminal and the bound mobile terminal;
when the distance exceeds a first set threshold value, periodically generating a random unlocking secret key, and sending the random unlocking secret key to a server;
when a data protection instruction triggered by a user is detected, the data protection instruction is sent to the server, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal can upload user data to the server conveniently, and the user data can be deleted from the mobile terminal.
In order to achieve the above object, an embodiment of the present application discloses a data processing apparatus, where the apparatus is disposed in a mobile terminal, and includes:
the distance determining module is used for determining the distance between the intelligent wearable equipment and the bound intelligent wearable equipment;
the mobile terminal locking module is used for locking the mobile terminal when the distance exceeds a first set threshold;
and the data processing module is used for uploading user data in the mobile terminal to the server and deleting the user data from the mobile terminal when detecting that the unlocking failure times of the mobile terminal exceed a second set threshold or receiving a data protection instruction sent by the server.
In order to achieve the above object, an embodiment of the present application discloses a data processing apparatus, the apparatus is disposed in an intelligent wearable device, and includes:
the distance determining module is used for determining the distance between the mobile terminal and the bound mobile terminal;
the random unlocking secret key generation module is used for periodically generating a random unlocking secret key when the distance exceeds a first set threshold value and sending the random unlocking secret key to the server;
and the data protection instruction sending module is used for sending the data protection instruction to the server when detecting the data protection instruction triggered by the user, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal is convenient to upload the user data to the server, and the user data is deleted from the mobile terminal.
In order to achieve the above object, an embodiment of the present application discloses a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor executes the computer program to implement the data processing method according to the embodiment of the present application.
In order to achieve the above object, an embodiment of the present application discloses a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements a data processing method as described in the embodiment of the present application.
The embodiment of the application discloses a data processing method, a data processing device, data processing equipment and a storage medium. The method is executed by a mobile terminal and comprises the following steps: determining the distance between the intelligent wearable device and the bound intelligent wearable device; when the distance exceeds a first set threshold value, locking the mobile terminal; and when the number of times of failure unlocking the mobile terminal exceeds a second set threshold value or a data protection instruction sent by the server is received, uploading the user data in the mobile terminal to the server, and deleting the user data from the mobile terminal. The data processing method provided by the embodiment of the application can realize the protection of the data in the mobile terminal and can improve the safety of the data.
Drawings
Fig. 1 is a flowchart of a data processing method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a data processing system provided by an embodiment of the present application;
fig. 3 is a flowchart of a data processing method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more apparent, embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "part", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no peculiar meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
In an embodiment, fig. 1 is a flowchart of a data processing method provided in an embodiment of the present application. The method can be applied to the condition of carrying out safety protection on the data in the mobile terminal. The method may be performed by a mobile terminal. As shown in fig. 1, the method includes S110-S130.
And S110, determining the distance between the binding intelligent wearable device and the binding intelligent wearable device.
Wherein, intelligence wearing equipment can include intelligent wrist-watch, intelligent bracelet, intelligent glasses and intelligent dress etc.. From the application, intelligent wearing equipment can be divided into two main categories: the outdoor field of sports and fitness and the field of medical care. The outdoor field of sports and fitness can comprise an intelligent watch, an intelligent bracelet, an intelligent accessory and the like, and the field of medical care can comprise a medical vest, a waistband, an implanted chip and the like. In this embodiment, the wearable device and the Mobile terminal device perform data interaction through the server, log in a manner of sharing an account in the server, use the intelligent wearable device as a main body, report a real-time location by a positioning module of the Mobile terminal, and perform unique identification between the multiple Mobile terminals by using an International Mobile Equipment Identity (IMEI). Illustratively, fig. 2 is a schematic diagram of a data processing system in the present embodiment. As shown in fig. 2, the system includes a mobile terminal, an intelligent wearable device and a server, wherein a cloud database is arranged in the server and used for storing data, and data interaction between the mobile terminal and the intelligent wearable device is realized through the server. The intelligent wearable device and the mobile terminal are bound through the server, and the same account or different accounts can be shared. If the intelligent wearable device and the mobile terminal device share different accounts, the intelligent wearable device can access the account of the mobile terminal and the mobile terminal can also access the account of the intelligent wearable device due to the binding relationship between the intelligent wearable device and the mobile terminal device. The corresponding account may be logged in at a login module of the respective device. And a mobile terminal list is generated on an operation interface of the intelligent wearable device, so that subsequent operation is facilitated. The user can also set each mobile terminal to set a safe distance and monitor the attribute on the operation interface of the intelligent wearable device. The monitoring attribute may include whether to perform security monitoring on the mobile terminal, a security monitoring mode, and the like. The mode of safety monitoring can comprise the mode of starting safety monitoring regularly or starting safety monitoring regularly. When the safety monitoring is started, the safety distance set by the user is the first set threshold.
In the embodiment of the application, a positioning module of the mobile terminal positions the mobile terminal to obtain the current position information of the mobile terminal, the mobile terminal sends the position information to the server, and the server sends the position information to the intelligent wearable device. The positioning module in the intelligent wearable device positions the intelligent wearable device to obtain the current position information of the intelligent wearable device, the intelligent wearable device sends the position information to the server, and the server sends the position information to the mobile terminal. Therefore, position sharing between the mobile terminal and the intelligent wearable device is achieved. The Positioning module may be a Global Positioning System (GPS) or a beidou satellite Positioning System.
Optionally, the manner of determining the distance between the binding smart wearable device and the binding smart wearable device may be: acquiring first position information of a mobile terminal at present; and sending the first location information to a server; acquiring second position information of the bound intelligent wearable device from the server; and determining the distance between the intelligent wearable device and the intelligent wearable device according to the first position information and the second position information.
The first position information and the second position information can be represented by longitude and latitude, and the straight-line distance between the mobile terminal and the intelligent wearable device can be calculated through the longitude and latitude information.
And S120, locking the mobile terminal when the distance exceeds a first set threshold value.
Wherein the first set threshold may be set by a user. Locking the mobile terminal may be understood as performing a screen-off operation on the mobile terminal, and when waking up again, the key is required to unlock.
Optionally, when the distance exceeds the first set threshold, the method further includes the following steps: the positioning module is controlled to remain in an on state and the operating switch of the positioning module is disabled.
In this embodiment, controlling the positioning module to be kept in the open state may be understood as forcing the positioning module to be in the open state. The operation switch for forbidding the positioning module can be understood as a switch which can not be operated by a user, so that the positioning module can be switched off by lawless persons after the mobile terminal is lost, and the position information can not be sent to the intelligent wearable device.
And S130, when the number of times of failure unlocking the mobile terminal exceeds a second set threshold value or a data protection instruction sent by the server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal.
And when the mobile terminal is locked, the mobile terminal needs to be unlocked by the unlocking secret key. If the user uses the correct unlocking secret key for unlocking, the unlocking can be successful, and if the user uses the wrong unlocking secret key for unlocking, the unlocking can be failed.
The data protection instruction is triggered by the user through the intelligent wearable device, sent to the server and then sent to the mobile terminal through the server.
In this embodiment, the process of detecting unlocking of the mobile terminal may be: receiving a first unlocking secret key input by a user; acquiring a second unlocking secret key from the server; judging whether the first unlocking secret key is matched with the second unlocking secret key or not, and if so, successfully unlocking; otherwise, the unlocking fails.
Wherein the first unlocking key can be directly input into the mobile terminal by the user. The second unlocking key may be randomly generated by the smart wearable device and sent to the server.
In the embodiment of the application, when the distance between the intelligent wearable device and the mobile terminal exceeds a first set threshold, the intelligent wearable device periodically and randomly generates a second unlocking secret key, and sends the second unlocking secret key to the server for storage, so that the mobile terminal can obtain the second unlocking secret key from the server during unlocking.
Specifically, when the number of times of failure in unlocking the mobile terminal is detected to exceed a second set threshold or a data protection instruction sent by the server is received, user data in the mobile terminal is uploaded to the server, and the user data is deleted from the mobile terminal.
The user data may be data generated by a user while using the mobile terminal. In this embodiment, all the user data may be uploaded to the server and deleted from the mobile terminal, or the user data with the set field may be uploaded to the server and deleted from the mobile terminal. The setting can be performed according to the actual requirement of the user, which is not limited herein. In the embodiment of the application, the user data in the movement is backed up to the database in the server, and the data of the mobile terminal is cleared at the same time, so that the aim of protecting the user data can be fulfilled.
In the embodiment of the application, each mobile terminal is provided with fixed unlocking times, and meanwhile, an operation interface of the intelligent wearable device also has an operation function of data protection, the fixed fields in the database are used for representing the fixed unlocking times, when the field value of the unlocking times is 0 or a user changes the field value of the data protection function through an operation module of the intelligent wearable device, local data backup of the mobile terminal is stored in the database by using an IMEI number identifier, and then the local data is deleted, so that the purpose of protecting the data security of the user is achieved.
The data protection instruction can be triggered by the user through modifying the field value of the unlocking times to 0 on the operation interface of the intelligent wearable device.
According to the technical scheme of the embodiment of the application, the distance between the intelligent wearable equipment and the bound intelligent wearable equipment is determined; when the distance exceeds a first set threshold value, locking the mobile terminal; and when the unlocking failure times of the mobile terminal exceed a second set threshold or a data protection instruction sent by the server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal. The data processing method provided by the embodiment of the application can realize the protection of the data in the mobile terminal and can improve the safety of the data.
Fig. 3 is a flowchart of a data processing method according to an embodiment of the present application. The method can be applied to the condition of carrying out safety protection on the data in the mobile terminal. The method may be performed by a smart wearable device. As shown in fig. 1, the method includes S210-S230.
And S210, determining the distance between the mobile terminal and the bound mobile terminal.
The mobile terminal can be a smart phone or a tablet.
In the embodiment of the application, the intelligent wearable device and the mobile terminal device have a binding relationship, and can share the same account or different accounts. If the intelligent wearable device and the mobile terminal device share different accounts, the intelligent wearable device can access the account of the mobile terminal and the mobile terminal can also access the account of the intelligent wearable device due to the binding relationship between the intelligent wearable device and the mobile terminal device. Both can log in the corresponding account at the login module of the respective device. And a mobile terminal list is generated on an operation interface of the intelligent wearable device, so that subsequent operation is facilitated. The user can also set each mobile terminal to set a safe distance and monitor the attribute on the operation interface of the intelligent wearable device. The monitoring attribute may include whether to perform security monitoring on the mobile terminal, a security monitoring mode, and the like. The mode of safety monitoring can comprise the mode of starting safety monitoring regularly or starting safety monitoring regularly. When the safety monitoring is started, the safety distance set by the user is the first set threshold.
In the embodiment of the application, the positioning module of the mobile terminal positions the mobile terminal to obtain the current position information of the mobile terminal, the mobile terminal sends the position information to the server, and the server sends the position information to the intelligent wearable device. The positioning module in the intelligent wearable device positions the intelligent wearable device to obtain the current position information of the intelligent wearable device, the intelligent wearable device sends the position information to the server, and the server sends the position information to the mobile terminal. Therefore, position sharing between the mobile terminal and the intelligent wearable device is achieved.
Optionally, the manner of determining the distance between the mobile terminal and the bound mobile terminal may be: acquiring first position information of a bound mobile terminal from a server; acquiring second position information of the intelligent wearable device at present; and sending the second location information to a server; and determining the distance between the mobile terminal and the mobile terminal according to the first position information and the second position information.
The first position information and the second position information can be represented by longitude and latitude, and the straight-line distance between the mobile terminal and the intelligent wearable device can be calculated through the longitude and latitude information.
And S220, periodically generating a random unlocking secret key when the distance exceeds a first set threshold value, and sending the random unlocking secret key to the server.
The random unlocking key may be generated according to any random generation algorithm, which is not limited herein.
Optionally, when the distance exceeds a first set threshold, the intelligent wearable device generates a reminding message to remind the user.
Wherein, the reminding information can be a sound reminding or a vibration reminding.
Optionally, the embodiment of the present application further includes the following steps: and displaying the random unlocking secret key and the first position information, so that the user searches for the mobile terminal according to the first position information and unlocks the mobile terminal according to the random unlocking secret key.
Wherein the first location information may be obtained by the smart wearable device from a server.
And S230, when a data protection instruction triggered by the user is detected, sending the data protection instruction to the server, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal uploads the user data to the server, and the user data is deleted from the mobile terminal.
The mode of triggering the user data protection instruction can be that a user modifies a field value of the unlocking times to 0 through an operation interface of the intelligent wearable device.
In the embodiment of the application, each mobile terminal is provided with fixed unlocking times, and meanwhile, an operation interface of the intelligent wearable device also has an operation function of data protection, the operation functions are all represented by fixed fields in a database, when a user changes a field value of the data protection function through an operation module of the intelligent wearable device, the data backup of the mobile terminal is stored in the database by using an IMEI number identifier, and then the data of the mobile terminal is deleted, so that the purpose of protecting the data security of the user is achieved.
According to the calculation scheme of the embodiment of the application, the distance between the mobile terminal and the bound mobile terminal is determined; when the distance exceeds a first set threshold value, periodically generating a random unlocking secret key, and sending the random unlocking secret key to a server; when a data protection instruction triggered by a user is detected, the data protection instruction is sent to the server, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal uploads user data to the server, and the user data are deleted from the mobile terminal. The data in the mobile terminal can be protected, and the security of the data can be improved.
Fig. 4 is a schematic structural diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus is disposed in a mobile terminal, and includes:
a distance determining module 410, configured to determine a distance between the binding smart wearable device and the binding smart wearable device;
a mobile terminal locking module 420, configured to lock the mobile terminal when the distance exceeds a first set threshold;
and the data processing module 430 is configured to, when it is detected that the number of times of failure to unlock the mobile terminal exceeds a second set threshold or a data protection instruction sent by the server is received, upload user data in the mobile terminal to the server, and delete the user data from the mobile terminal.
Optionally, the distance determining module 410 is further configured to:
acquiring first position information of a mobile terminal at present; and sending the first location information to a server;
acquiring second position information of the bound intelligent wearable device from the server;
and determining the distance between the intelligent wearable device and the intelligent wearable device according to the first position information and the second position information.
Optionally, the method further includes: an operation switch disabling module of the positioning module for:
the positioning module is controlled to remain in an on state and the operating switch of the positioning module is disabled.
Optionally, the method further includes: an unlocking module for:
receiving a first unlocking secret key input by a user;
acquiring a second unlocking secret key from the server;
judging whether the first unlocking secret key is matched with the second unlocking secret key or not, and if so, successfully unlocking; otherwise, the unlocking fails.
Fig. 5 is a schematic structural diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus is disposed in an intelligent wearable device, and includes:
a distance determining module 510, configured to determine a distance between the mobile terminal and the bound mobile terminal;
the random unlocking secret key generation module 520 is configured to periodically generate a random unlocking secret key when the distance exceeds a first set threshold, and send the random unlocking secret key to the server;
the data protection instruction sending module 530 is configured to send the data protection instruction to the server when the data protection instruction triggered by the user is detected, so that the server sends the data protection instruction to the mobile terminal, so that the mobile terminal uploads the user data to the server and deletes the user data from the mobile terminal.
Optionally, the distance determining module 510 is further configured to:
acquiring first position information of a bound mobile terminal from a server;
acquiring second position information of the intelligent wearable device at present; and sending the second location information to a server;
and determining the distance between the mobile terminal and the mobile terminal according to the first position information and the second position information.
Optionally, the method further includes: and the reminding module is used for generating reminding information by the intelligent wearable equipment when the distance exceeds a first set threshold value so as to remind the user.
Optionally, the method further includes: a display module to:
and displaying the random unlocking secret key and the first position information, so that the user searches for the mobile terminal according to the first position information and unlocks the mobile terminal according to the random unlocking secret key.
In one embodiment, fig. 6 is a schematic structural diagram of a computer device provided in an embodiment of the present application. As shown in fig. 6, the present application provides an apparatus comprising: a processor 310 and a memory 320. The number of the processors 310 in the device may be one or more, and one processor 310 is taken as an example in fig. 6. The number of the memories 320 in the device may be one or more, and one memory 320 is taken as an example in fig. 6. The processor 310 and the memory 320 of the device may be connected by a bus or other means, as exemplified by the bus connection in fig. 6. In an embodiment, the device is a computer device.
The memory 320, which is a computer-readable storage medium, may be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the apparatus of any embodiment of the present application (e.g., the encoding module and the first sending module in the data transmission apparatus). The memory 320 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 320 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 320 may further include memory located remotely from the processor 310, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The device provided above can be configured to execute the method applied to data processing provided in any of the above embodiments, and has corresponding functions and effects.
The program stored in the corresponding memory 320 may be a program instruction/module corresponding to the interrupt processing method provided in the embodiment of the present application, and the processor 310 executes one or more functional applications and data processing of the computer device by executing the software program, instructions and modules stored in the memory 320, that is, implementing the associated query method applied to data in the above method embodiment. It can be understood that, when the device is a receiving end, the compensation method applied to the under-screen camera shooting display area provided by any embodiment of the present application can be executed, and the device has corresponding functions and effects.
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a data processing method, the method comprising: determining the distance between the intelligent wearable equipment and the bound intelligent wearable equipment; when the distance exceeds a first set threshold value, locking the mobile terminal; when the number of times of failure unlocking the mobile terminal exceeds a second set threshold value or a data protection instruction sent by a server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal. Or, determining the distance between the mobile terminal and the bound mobile terminal; when the distance exceeds a first set threshold value, periodically generating a random unlocking secret key, and sending the random unlocking secret key to a server; when a data protection instruction triggered by a user is detected, the data protection instruction is sent to the server, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal can upload user data to the server conveniently, and the user data can be deleted from the mobile terminal.
It will be clear to a person skilled in the art that the term user equipment covers any suitable type of wireless user equipment, such as mobile phones, portable data processing devices, portable web browsers or vehicle-mounted mobile stations.
In general, the various embodiments of the application may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, for example in a processor entity, or by hardware, or by a combination of software and hardware. The computer program instructions may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages.
Any logic flow block diagrams in the figures of this application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program may be stored on a memory. The Memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, read-Only Memory (ROM), random Access Memory (RAM), optical storage devices and systems (Digital Video Disc (DVD) or Compact Disc (CD)), etc. The computer readable medium may include a non-transitory storage medium. The data processor may be of any type suitable to the local technical environment, such as but not limited to general purpose computers, special purpose computers, microprocessors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), programmable logic devices (FGPAs), and processors based on a multi-core processor architecture.
The above description is only exemplary embodiments of the present application, and is not intended to limit the scope of the present application.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, for example in a processor entity, or by hardware, or by a combination of software and hardware. The computer program instructions may be assembly instructions, instruction Set Architecture (ISA) instructions, machine related instructions, microcode, firmware instructions, state setting data, or source code or destination code written in any combination of one or more programming languages.
The foregoing has provided by way of exemplary and non-limiting examples a detailed description of exemplary embodiments of the present application. Various modifications and adaptations to the foregoing embodiments may become apparent to those skilled in the relevant arts in view of the following drawings and the appended claims without departing from the scope of the invention. Therefore, the proper scope of the present invention is defined by the appended claims.

Claims (12)

1. A data processing method, characterized in that the method is performed by a mobile terminal, and comprises:
determining the distance between the intelligent wearable equipment and the bound intelligent wearable equipment;
when the distance exceeds a first set threshold value, locking the mobile terminal;
when the number of times of failure unlocking the mobile terminal exceeds a second set threshold value or a data protection instruction sent by a server is received, uploading user data in the mobile terminal to the server, and deleting the user data from the mobile terminal.
2. The method of claim 1, wherein determining a distance to the bound smart wearable device comprises:
acquiring first position information of the mobile terminal at present; and sending the first location information to the server;
acquiring second position information of the bound intelligent wearable device from the server;
and determining the distance between the intelligent wearable device and the intelligent wearable device according to the first position information and the second position information.
3. The method of claim 2, wherein when the distance exceeds a first set threshold, further comprising:
controlling the positioning module to remain in an on state and disabling an operating switch of the positioning module.
4. The method of claim 1, wherein detecting unlocking of the mobile terminal comprises:
receiving a first unlocking secret key input by a user;
obtaining a second unlocking secret key from the server;
judging whether the first unlocking secret key is matched with the second unlocking secret key or not, and if so, successfully unlocking; otherwise, the unlocking fails.
5. A data processing method is executed by intelligent wearable equipment and comprises the following steps:
determining the distance between the mobile terminal and the bound mobile terminal;
when the distance exceeds a first set threshold value, periodically generating a random unlocking secret key, and sending the random unlocking secret key to a server;
when a data protection instruction triggered by a user is detected, the data protection instruction is sent to the server, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal uploads user data to the server conveniently, and the user data are deleted from the mobile terminal.
6. The method of claim 5, wherein determining the distance to the bound mobile terminal comprises:
acquiring first position information of the bound mobile terminal from the server;
acquiring second position information of the intelligent wearable device at present; and sending the second location information to the server;
and determining the distance between the mobile terminal and the mobile terminal according to the first position information and the second position information.
7. The method according to claim 5, wherein when the distance exceeds a first set threshold, the smart wearable device generates a reminder message to remind the user.
8. The method of claim 6, further comprising:
and displaying the random unlocking secret key and the first position information, so that a user searches for the mobile terminal according to the first position information and unlocks the mobile terminal according to the random unlocking secret key.
9. A data processing apparatus, provided in a mobile terminal, comprising:
the distance determining module is used for determining the distance between the intelligent wearable equipment and the bound intelligent wearable equipment;
the mobile terminal locking module is used for locking the mobile terminal when the distance exceeds a first set threshold;
and the data processing module is used for uploading user data in the mobile terminal to the server and deleting the user data from the mobile terminal when detecting that the unlocking failure times of the mobile terminal exceed a second set threshold or receiving a data protection instruction sent by the server.
10. The utility model provides a data processing apparatus, its characterized in that, the device sets up in intelligent wearing equipment, includes:
the distance determining module is used for determining the distance between the mobile terminal and the bound mobile terminal;
the random unlocking secret key generation module is used for periodically generating a random unlocking secret key when the distance exceeds a first set threshold value and sending the random unlocking secret key to the server;
and the data protection instruction sending module is used for sending the data protection instruction to the server when detecting the data protection instruction triggered by the user, so that the server sends the data protection instruction to the mobile terminal, the mobile terminal uploads the user data to the server conveniently, and the user data is deleted from the mobile terminal.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the data processing method according to any of claims 1-8 when executing the program.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the data processing method of any one of claims 1 to 8.
CN202110975368.XA 2021-08-24 2021-08-24 Data processing method, device, equipment and storage medium Pending CN115718924A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110975368.XA CN115718924A (en) 2021-08-24 2021-08-24 Data processing method, device, equipment and storage medium
PCT/CN2022/111028 WO2023024888A1 (en) 2021-08-24 2022-08-09 Data processing method and apparatus, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110975368.XA CN115718924A (en) 2021-08-24 2021-08-24 Data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115718924A true CN115718924A (en) 2023-02-28

Family

ID=85253472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110975368.XA Pending CN115718924A (en) 2021-08-24 2021-08-24 Data processing method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN115718924A (en)
WO (1) WO2023024888A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118087B (en) * 2013-01-22 2017-09-29 Tcl集团股份有限公司 A kind of mobile communication terminal and its data guard method, system
JP6360778B2 (en) * 2014-03-26 2018-07-18 株式会社Nttドコモ Wearable terminal and portable terminal
CN105530356B (en) * 2015-12-21 2018-06-01 珠海格力电器股份有限公司 Communication terminal and its data guard method and device
CN108811181A (en) * 2018-04-27 2018-11-13 努比亚技术有限公司 Intelligent wearable device, security method and computer readable storage medium

Also Published As

Publication number Publication date
WO2023024888A1 (en) 2023-03-02

Similar Documents

Publication Publication Date Title
US10515203B2 (en) Method and system for improving security of a mobile terminal
US10129381B2 (en) Disablement of lost or stolen device
EP2115953B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US6362736B1 (en) Method and apparatus for automatic recovery of a stolen object
US8718602B2 (en) Method and system for remote control of smart card
US20180190097A1 (en) Method and smart wearable device for children's security
CN105493160A (en) Mobile-device security
CN105992125B (en) Method and device for protecting safety of electronic equipment
JP4756902B2 (en) Information leakage prevention system
JP2012105163A (en) Information processing system, server, terminal, information processing method and computer program
CN112615722A (en) Smart watch searching method and device, computer equipment and storage medium
KR101548729B1 (en) Method for porviding safe return service
CN109241783B (en) Implementation method and device for mobile terminal management and control strategy
CN106534516A (en) Intelligent mobile phone, theft tracking system and theft tracking method
WO2017177789A1 (en) Anti-theft method and device for mobile terminal
CN115718924A (en) Data processing method, device, equipment and storage medium
CN115329314A (en) Face authentication method, device, equipment, system, storage medium and product
CN111132139B (en) Antitheft control method and intelligent wearable device
CN103945325A (en) Mobile phone anti-theft and tracking system based on J2EE and Android platform
US10710553B2 (en) Vehicle control device having user authentication unit performing authentication of user of vehicle and vehicle use permission unit permitting use of vehicle by user
US11570599B2 (en) Mobile communication terminal and control method therefor
CN114268907A (en) Mobile terminal loss tracking method and device, mobile terminal and medium
CN114302348B (en) Message generation method, device, electronic equipment and computer readable storage medium
CN113890931B (en) Cross-device operation method, device, equipment and medium
CN115743028A (en) Keyless entry control system, keyless entry method and device for vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication